Allow adding syscalls by group names #18

Lezárt
megnyitva 2021-09-06 22:35:05 +02:00 crtxcr által · 1 comment
Tulajdonos

If you add "open", there is a chance you also want to block "openat"...

So make this easy by allow adding system call by group names to the policy.

Also, maybe take some inspiration from pledge().

If you add "open", there is a chance you also want to block "openat"... So make this easy by allow adding system call by group names to the policy. Also, maybe take some inspiration from pledge().
crtxcr added the
enhancement
label 2021-09-06 22:35:05 +02:00
Author
Tulajdonos

If there was a kernel update, but no qssb.h update or code is using an outdated verison, new syscalls could have been added that are not in any group yet.

Thus, we may habe to auto blacklist all those that we do not know.

Alternatively, adding syscalls by groups should only be allowed for whitelisting?

If there was a kernel update, but no qssb.h update or code is using an outdated verison, new syscalls could have been added that are not in any group yet. Thus, we may habe to auto blacklist all those that we do not know. Alternatively, adding syscalls by groups should only be allowed for whitelisting?
Jelentkezz be hogy csatlakozz a beszélgetéshez.
Nincs mérföldkő
Nincsenek megbízottak
1 Résztvevő
Értesítések
Határidő
The due date is invalid or out of range. Please use the format 'yyyy-mm-dd'.

Nincs beállítva határidő.

Függőségek

No dependencies set.

Reference: crtxcr/exile.h#18
No description provided.